Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.19.136.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56261
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.19.136.75.			IN	A

;; AUTHORITY SECTION:
.			253	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:56:59 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 75.136.19.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 75.136.19.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.206 attackspambots
Jan 23 10:48:56 vmanager6029 sshd\[15406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.206  user=root
Jan 23 10:48:58 vmanager6029 sshd\[15406\]: Failed password for root from 218.92.0.206 port 55723 ssh2
Jan 23 10:49:00 vmanager6029 sshd\[15406\]: Failed password for root from 218.92.0.206 port 55723 ssh2
2020-01-23 23:19:38
40.143.228.6 attackspam
Jan 23 17:18:58 www1 sshd\[53764\]: Failed password for root from 40.143.228.6 port 23430 ssh2Jan 23 17:20:27 www1 sshd\[54062\]: Invalid user mcserver from 40.143.228.6Jan 23 17:20:29 www1 sshd\[54062\]: Failed password for invalid user mcserver from 40.143.228.6 port 9842 ssh2Jan 23 17:21:59 www1 sshd\[54145\]: Failed password for root from 40.143.228.6 port 33656 ssh2Jan 23 17:23:30 www1 sshd\[54219\]: Invalid user hoge from 40.143.228.6Jan 23 17:23:32 www1 sshd\[54219\]: Failed password for invalid user hoge from 40.143.228.6 port 51487 ssh2
...
2020-01-23 23:25:00
150.129.104.241 attack
1579765657 - 01/23/2020 08:47:37 Host: 150.129.104.241/150.129.104.241 Port: 445 TCP Blocked
2020-01-23 23:20:25
46.48.48.5 attackspambots
Unauthorized connection attempt detected from IP address 46.48.48.5 to port 2220 [J]
2020-01-23 23:18:37
123.207.35.22 attack
Jan 23 15:33:29 mout sshd[4977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.35.22  user=root
Jan 23 15:33:31 mout sshd[4977]: Failed password for root from 123.207.35.22 port 42194 ssh2
2020-01-23 23:19:58
180.157.252.206 attack
Jan 22 10:32:27 finn sshd[25592]: Invalid user yuki from 180.157.252.206 port 43230
Jan 22 10:32:27 finn sshd[25592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.157.252.206
Jan 22 10:32:29 finn sshd[25592]: Failed password for invalid user yuki from 180.157.252.206 port 43230 ssh2
Jan 22 10:32:30 finn sshd[25592]: Received disconnect from 180.157.252.206 port 43230:11: Bye Bye [preauth]
Jan 22 10:32:30 finn sshd[25592]: Disconnected from 180.157.252.206 port 43230 [preauth]
Jan 22 10:35:45 finn sshd[26680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.157.252.206  user=r.r
Jan 22 10:35:47 finn sshd[26680]: Failed password for r.r from 180.157.252.206 port 33974 ssh2
Jan 22 10:35:47 finn sshd[26680]: Received disconnect from 180.157.252.206 port 33974:11: Bye Bye [preauth]
Jan 22 10:35:47 finn sshd[26680]: Disconnected from 180.157.252.206 port 33974 [preauth]


........
---------------------------------------------
2020-01-23 23:10:50
51.91.120.155 attackspambots
Jan 23 08:34:03 ip-172-31-62-245 sshd\[30221\]: Invalid user ubnt from 51.91.120.155\
Jan 23 08:34:05 ip-172-31-62-245 sshd\[30221\]: Failed password for invalid user ubnt from 51.91.120.155 port 43244 ssh2\
Jan 23 08:34:06 ip-172-31-62-245 sshd\[30223\]: Invalid user admin from 51.91.120.155\
Jan 23 08:34:07 ip-172-31-62-245 sshd\[30223\]: Failed password for invalid user admin from 51.91.120.155 port 46626 ssh2\
Jan 23 08:34:11 ip-172-31-62-245 sshd\[30225\]: Failed password for root from 51.91.120.155 port 49146 ssh2\
2020-01-23 22:53:41
5.8.10.202 attackspambots
Jan 23 08:49:04 IngegnereFirenze sshd[19622]: Did not receive identification string from 5.8.10.202 port 48358
...
2020-01-23 22:49:51
46.38.144.79 attack
Jan 23 15:32:12 s1 postfix/submission/smtpd\[28092\]: warning: unknown\[46.38.144.79\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 23 15:32:32 s1 postfix/submission/smtpd\[28092\]: warning: unknown\[46.38.144.79\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 23 15:32:50 s1 postfix/submission/smtpd\[28092\]: warning: unknown\[46.38.144.79\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 23 15:33:11 s1 postfix/submission/smtpd\[20516\]: warning: unknown\[46.38.144.79\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 23 15:33:31 s1 postfix/submission/smtpd\[28092\]: warning: unknown\[46.38.144.79\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 23 15:33:51 s1 postfix/submission/smtpd\[28300\]: warning: unknown\[46.38.144.79\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 23 15:34:10 s1 postfix/submission/smtpd\[20516\]: warning: unknown\[46.38.144.79\]: SASL LOGIN authentication failed: VXNlcm5hbWU6
Jan 23 15:34:31 s1 postfix/submission/smtpd\[28300\]: warning: unknown\[46.38.1
2020-01-23 22:56:55
85.172.107.10 attack
Jan 23 04:48:55 auw2 sshd\[27413\]: Invalid user test from 85.172.107.10
Jan 23 04:48:55 auw2 sshd\[27413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.172.107.10
Jan 23 04:48:57 auw2 sshd\[27413\]: Failed password for invalid user test from 85.172.107.10 port 41874 ssh2
Jan 23 04:54:27 auw2 sshd\[27822\]: Invalid user buster from 85.172.107.10
Jan 23 04:54:27 auw2 sshd\[27822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.172.107.10
2020-01-23 23:08:53
23.252.58.109 attackspam
Unauthorized connection attempt detected from IP address 23.252.58.109 to port 2220 [J]
2020-01-23 22:54:45
111.85.67.130 attackbotsspam
RDP Bruteforce
2020-01-23 22:51:52
112.133.236.125 attack
1579767341 - 01/23/2020 09:15:41 Host: 112.133.236.125/112.133.236.125 Port: 445 TCP Blocked
2020-01-23 23:32:56
50.63.166.50 attack
xmlrpc attack
2020-01-23 23:17:34
154.209.4.116 attackspam
Unauthorized connection attempt detected from IP address 154.209.4.116 to port 2220 [J]
2020-01-23 23:08:16

Recently Reported IPs

104.19.134.75 104.19.137.100 104.19.138.104 104.19.137.75
104.19.138.75 104.19.137.90 104.21.65.97 104.19.139.104
104.19.139.75 104.19.139.77 104.19.138.77 104.19.141.75
104.19.141.77 104.19.140.75 104.19.140.77 104.19.142.100
104.19.142.77 104.19.143.100 104.21.66.103 104.19.142.75